Kansas Schoolboard
At least Kansas voted out all the school board members who were pushing intelligent design in the class. Although it still does amaze me that school board members don't have to have any credentials to be such.
138 publicly visible posts • joined 25 Nov 2009
1. This law only covers video games. Why aren't movies, books, or other media included if this is so difficult to control? Books don't even have a rating system and can be very graphic, but no one seems worried about that.
2. All consoles now have parental control systems that can be used to prevent you're kid from playing these kind of games. This would work if they have purchased the game on their own or borrowed it from a friend, but obviously not if they went to a friends house to play it. If you are worried about computer games, you shouldn't let your kids have an admin account on the computer, but most parents probably don't know how to do that.
It doesn't bother me too much. Depending on the total number of reviews the ones posted by the employees could easily have been insufficient to alter the scoring much.
The example comments are exactly what I ignore when I'm looking at reviews. They tell me nothing about the product.
My password generation technique is easier in my opinion. You take a phrase that sticks in your head, say 'I hate passwords'. Then you mash it up a bit and get something like, 'I h@e passw0rds'. A 15 character password with 3 symbols and a number and mixed case, all easy to remember and difficult to crack. At least with the password crackers I've used in the past.
I've never encountered a Firewall with that capability. Must be a proxy based Firewall which means it probably breaks a fair number of web apps. Proxy based Firewalls wont allow protocols to do anything they are unfamiliar with so no HTML5 or such without an upgrade.
Considering how poorly malware scanners are doing these days, I suspect they are opening themselves up to a targeted attack. Spearphishing emails at the ready.
Every organization and individual you interact with wants to change the way you behave. Politicians do it to get votes. Corporations do it to get you to buy their products. Friends, wives, husbands all do it for all kinds of reasons.
It is nearly impossible to interact with someone else without trying to alter their behavior in some way. The difference is mostly in the extent to which they want to alter it, but it is almost always for personal gain and not always intended. Peer pressure is a very powerful force.
Also any group will tend to view non-members in a more negative perspective then members. Most groups exist not just to tie members together, but to keep those who don't adhere to their beliefs out. It isn't something that is limited to religions and cults.
I keep seeing this argument over and over and I have yet to figure out how anyone can believe it.
If I left my phone in a bar why the hell would you call Sanyo and tell them you found it? Even after logging into my Fb page from the phone and finding out what my name is you still think the appropriate way to return it is calling Sanyo? Certainly turning it over to the bar in the case I might come back for it would never cross your mind.
Incorrect statements.
"Without TCP/IP, Flash is basically useless anyway, unless you only use Email, and in that case you don't really need the Internet because Email goes over a separate protocol to web traffic."
Email uses TCP/IP so you can't use email without it.
The Internet uses far more then the HTTP protocol. The Email Protocol, SMTP, uses the internet.
Most Email clients these days are able to use HTTP email which means you can have flash embedded in email.
"I only ever use the Email protocol to browse the web, meaning I don't use the Flash engine."
When you use HTTP email you are using the web protocol to view the "Internet" if the email message is not using HTTP it isn't "browsing" the web in any way.
Generally browsing the web refers to visiting web pages which is at best difficult to do inside of an email client.
I've found that many software vendors assume that because their software package is intended for internal use they don't need to implement any significant security measures. I think the earlier you know weather an application will meet your companies security requirements the better.